In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).
An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?
Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope?
Which of the following is the unit used to transfer information at Layer 2 of the OSI model?
Which of the following is the default authentication method for a Windows client using PPP over a dialup connection?
Which of the following network appliances will only detect and not prevent malicious network activity?
A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?
Which of the following wireless router security measures provides access to a network by allowing only devices on an approved physical address list?
An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this?
Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
Which of the following security appliances are used to only identify traffic on individual systems?
Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?
A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?
Which of the following are authentication methods that can use AAA authentication? (Select TWO).
Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?
Which of the following is the only standard that can operate at either frequency?
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running?
Which of the following wireless standards can transmit data up to 540Mbps?
A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?
Which of the following network protocols is used for a secure command line interface for management of network devices?
Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?
Which of the following are standard fiber cable connector types? (Select TWO).
Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?
A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:
1-----------1
2-----------2
3-----------3
4-----------4
5-----------5
6-----------6
7-----------7
8-----------8
Which of the following should the technician do NEXT?
A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?
Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?
It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?
Which of the following defines a rack located in an office building between the main rack and other office equipment?
Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?
A user reports that several spots within the company’s office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem?
Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?
A technician has set up a wired network IP scheme with the following specifications:
DHCP: 192.168.1.100-150
Gateway: 192.168.1.1
DNS: 192.168.1.1
Which of the following is represented by this addressing scheme?
A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?
A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?
A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions?
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?
Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?
A technician is troubleshooting a network camera. The technician restarted the modem and now the camera is no longer available from a mobile device. Which of the following has MOST likely occurred?
Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP’s to use?
A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?
A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?
A technician is attempting to set up a new laptop for a user. The user’s old laptop connects to the corporate wireless network “CompanyWiFi” automatically. However, when the technician looks for the “CompanyWiFi” network on the new laptop, he does not find it in the list of available networks. Both laptops have 802.11g wireless network adapters and are sitting next to each other on the user’s desk. Which of the following would MOST likely be the reason that the new laptop cannot see the “CompanyWiFi” network?
Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann’s problem?
Computer_ASwitch_A
IP: 10.0.0.60Int VLAN10
SM: 255.255.255.0IP address 10.0.0.1/28
GW: 10.0.0.1Speed 100 Duplex Full
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?
A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?
A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?
The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model?
A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?
A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO).
A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?
A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?
A company has a total of two public IP addresses and must allow 150 devices to connect to the Internet at the same time. Which of the following is the BEST option for connectivity?
The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?
In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?
A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause?
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C
Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?
A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?
A user at a small business states that they cannot connect to the Internet via the company’s wireless network every time their cordless phone rings. Which of the following is MOST likely occurring?
Which of the following can determine the last time an address lease was renewed on a network device?
Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?
Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
Hubs are differentiated from switches in that between the two, only hubs have:
A technician has resolved a ticket to fix a user’s printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?
A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments?
Which of the following protocols could the below packet capture be from?
Port: 161
msgVersion:
msgUsername:
msgAuthenticationParameters:
msgPrivacyParameters:
msgData:
data: get-request
request-iD.
error-status: noError (0)
error-index: 0
variable-bindings: 0 items
Assigning the same IP address to a network device is which of the following?
Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:
IP address: 192.168.0.124
Subnet Mask: 255.255.255.128
Default Gateway: 192.168.0.254
Which is MOST likely preventing the user from accessing the Internet?
Which of the following network protocols is used to transport email between servers?
Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).
Which of the following is the BEST network configuration to use if the technician wants to send all outgoing traffic to the external router?
Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).
A network where all traffic feeds through a centralized gateway uses which of the following topologies?
Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer?
Which of the following protocols is the BEST choice for retrieving email on multiple devices?
Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?
Which of the following devices can be utilized to monitor and block websites accessible by a company?
A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly?
An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed?
A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?
An administrator can use packet tags to configure which of the following?
An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed?
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?
Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?
A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?
A company has a server with redundant power supplies. Which of the following is this an example of?
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?
Which of the following switches is used with ARP to display the cache entry for a specific IP address?
A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?
Ann, a user, connects to her company’s secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
A company has a remote access VPN and wants to ensure that if a username and password are compromised, the corporate network will remain secure. Which of the following will allow the company to achieve its security goal?
The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI?
Which of the following cable types supports the FURTHEST distance when connecting various MDFs?
Which of the following wiring components is used as a central point of termination for all network jacks through a building area?
Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?
Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?